Mandriva Linux Security Advisory : ruby (MDVSA-2015:129)

medium Nessus Plugin ID 82382

Synopsis

The remote Mandriva Linux host is missing one or more security updates.

Description

Updated ruby packages fix security vulnerabilities :

Due to unrestricted entity expansion, when reading text nodes from an XML document, the REXML parser in Ruby can be coerced into allocating extremely large string objects which can consume all of the memory on a machine, causing a denial of service (CVE-2014-8080).

Will Wood discovered that Ruby incorrectly handled the encodes() function. An attacker could possibly use this issue to cause Ruby to crash, resulting in a denial of service, or possibly execute arbitrary code. The default compiler options for affected releases should reduce the vulnerability to a denial of service (CVE-2014-4975).

Due to an incomplete fix for CVE-2014-8080, 100% CPU utilization can occur as a result of recursive expansion with an empty String. When reading text nodes from an XML document, the REXML parser in Ruby can be coerced into allocating extremely large string objects which can consume all of the memory on a machine, causing a denial of service (CVE-2014-8090).

Solution

Update the affected packages.

See Also

http://advisories.mageia.org/MGASA-2014-0443.html

http://advisories.mageia.org/MGASA-2014-0472.html

Plugin Details

Severity: Medium

ID: 82382

File Name: mandriva_MDVSA-2015-129.nasl

Version: 1.6

Type: local

Published: 3/30/2015

Updated: 1/14/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: Medium

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:ruby-tk, cpe:/o:mandriva:business_server:2, p-cpe:/a:mandriva:linux:lib64ruby2.0, p-cpe:/a:mandriva:linux:ruby, p-cpe:/a:mandriva:linux:ruby-devel, p-cpe:/a:mandriva:linux:ruby-doc, p-cpe:/a:mandriva:linux:ruby-irb

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Patch Publication Date: 3/29/2015

Reference Information

CVE: CVE-2014-4975, CVE-2014-8080, CVE-2014-8090

MDVSA: 2015:129